Microsoft SharePoint 2013 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +38 −39
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 38
- V-223238 Medium SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.
- V-223239 Medium SharePoint must maintain and support the use of security attributes with stored information.
- V-223240 High SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.
- V-223241 High SharePoint must use cryptography to protect the integrity of the remote access session.
- V-223242 Medium SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.
- V-223243 High SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.
- V-223244 Medium SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.
- V-223245 Medium SharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy.
- V-223246 Medium SharePoint must display an approved system use notification message or banner before granting access to the system.
- V-223247 Medium SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.
- V-223248 Medium SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.
- V-223249 High SharePoint must prevent the execution of prohibited mobile code.
- V-223250 Medium SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.
- V-223251 Medium SharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- V-223252 High SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- V-223254 High SharePoint must employ NSA-approved cryptography to protect classified information.
- V-223255 High SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.
- V-223257 High SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.
- V-223258 High SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.
- V-223259 High SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.
- V-223260 High SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.
- V-223261 Medium SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
- V-223262 High SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.
- V-223263 High SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.
- V-223264 High SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- V-223265 Medium The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.
- V-223266 Medium For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.
- V-223267 Medium The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).
- V-223268 Medium The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.
- V-223269 Medium The SharePoint setup account must be configured with the minimum privileges in Active Directory.
- V-223270 Medium The SharePoint setup account must be configured with the minimum privileges on the SQL server.
- V-223271 Medium The SharePoint setup account must be configured with the minimum privileges for the local server.
- V-223272 Low A secondary SharePoint site collection administrator must be defined when creating a new site collection.
- V-223273 Medium When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.
- V-223274 Medium SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured.
- V-223275 Medium SharePoint server access to the Online Web Part Gallery must be configured for limited access.
- V-223276 Medium The SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.
- V-223277 Medium SharePoint must validate the integrity of security attributes exchanged between systems.
Removed rules 39
- V-59919 Medium SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.
- V-59935 Medium SharePoint must maintain and support the use of security attributes with stored information.
- V-59937 High SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.
- V-59939 High SharePoint must use cryptography to protect the integrity of the remote access session.
- V-59941 Medium SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.
- V-59943 High SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.
- V-59945 Medium SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.
- V-59947 Medium SharePoint must provide the ability to prohibit the transfer of unsanctioned information in accordance with security policy.
- V-59949 Medium SharePoint must display an approved system use notification message or banner before granting access to the system.
- V-59953 Medium SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.
- V-59955 Medium SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.
- V-59957 High SharePoint must prevent the execution of prohibited mobile code.
- V-59961 Medium SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.
- V-59963 Medium SharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- V-59965 High SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- V-59967 High SharePoint must employ FIPS-validated cryptography to protect unclassified information.
- V-59969 High SharePoint must employ NSA-approved cryptography to protect classified information.
- V-59971 High SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.
- V-59973 High SharePoint must validate the integrity of security attributes exchanged between systems.
- V-59975 High SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.
- V-59977 High SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.
- V-59979 High SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.
- V-59981 High SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.
- V-59983 Medium SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
- V-59985 High SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.
- V-59987 High SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.
- V-59989 High SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- V-59991 Medium SharePoint server access to the Online Web Part Gallery must be configured for limited access.
- V-59993 Medium The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.
- V-59995 Medium For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.
- V-59997 Medium The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).
- V-59999 Medium The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.
- V-60001 Medium The SharePoint setup account must be configured with the minimum privileges in Active Directory.
- V-60003 Medium The SharePoint setup account must be configured with the minimum privileges on the SQL server.
- V-60005 Medium The SharePoint setup account must be configured with the minimum privileges for the local server.
- V-60007 Low A secondary SharePoint site collection administrator must be defined when creating a new site collection.
- V-60009 Medium When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.
- V-60011 Medium SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured.
- V-60391 Medium The SharePoint farm service account (database access account) must be configured with the minimum privileges for the local server.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SP13-00-000005
- Vuln IDs
-
- V-223238
- V-59919
- Rule IDs
-
- SV-223238r612235_rule
- SV-74349
Checks: C-24911r430774_chk
Review the SharePoint server configuration to ensure a session lock occurs after 15 minutes of inactivity. In SharePoint Central Administration, click Application Management. On the Application Management page, in the Web Applications section, click Manage web applications. Verify that each web application meets this requirement. - Select the web application. - Select General Settings >> General Settings. - Navigate to the Web Page Security Validation section. - Verify that the Security Validation is "On" and set to expire after 15 minutes or less. If Security Validation is "Off" or if the default time-out period is not set to 15 minutes or less for any of the web applications, this is a finding.
Fix: F-24899r430775_fix
Configure the SharePoint server to lock the session lock after 15 minutes of inactivity. In SharePoint Central Administration, click Application Management. On the Application Management page, in the Web Applications section, click Manage web applications. Perform the following steps for each web application. - Select web application. - Select General Settings >> General Settings. - Navigate to Web Page Security Validation. - Set the "Security validation is:" property to On. - Set the "Security validation expires:" property to After. - Set the default time-out period to 15 minutes or less. - Select OK to save settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000010
- Vuln IDs
-
- V-223239
- V-59935
- Rule IDs
-
- SV-223239r612235_rule
- SV-74365
Checks: C-24912r430777_chk
Review the SharePoint server to ensure the use of security attributes with stored information is maintained. Click Site Settings. Under the Web Designer Galleries menu, click Site Content Types. Define a set of Content Types that can hold "security attributes", e.g., FOUO, etc. For each required Content Type, under "Change Content Type Column" ensure "Required (Must contain information) is selected. Otherwise, this is a finding.
Fix: F-24900r430778_fix
Configure the SharePoint server to maintain and support the use of security attributes with stored information. From the Site Collection Settings menu: Add a column to Content Types that can hold "security attributes", e.g., FOUO, etc., and "prompt the user to enter as metadata or properties to collect when documents of this content type are added to SharePoint."
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SP13-00-000015
- Vuln IDs
-
- V-223240
- V-59937
- Rule IDs
-
- SV-223240r612235_rule
- SV-74367
Checks: C-24913r430780_chk
Review the SharePoint server configuration to ensure approved cryptography is being utilized to protect the confidentiality of remote access sessions. Navigate to Central Administration. Under “System Settings”, click “Configure Alternate Access mappings”. Review the “Public URL for zone” column values. If any URL does not begin with “https”, this is a finding.
Fix: F-24901r430781_fix
Configure the SharePoint server to use approved cryptography to protect the confidentiality of remote access sessions. Open IIS Manager. In the Connections pane, expand "Sites". Click the "Web Application" site. In the Actions pane, click "Bindings". In the Site Bindings window, click "Add". In the Add Site Binding window, change "Type" to "https", and select the site's SSL certificate. Click "OK". Remove all bindings that do not use https. Click "Close".
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- SP13-00-000020
- Vuln IDs
-
- V-223241
- V-59939
- Rule IDs
-
- SV-223241r612235_rule
- SV-74369
Checks: C-24914r430783_chk
Review the SharePoint server configuration to ensure cryptography is being used to protect the integrity of the remote access session. Navigate to Central Administration. Under “System Settings”, click “Configure Alternate Access mappings”. Review the “Public URL for zone” column values. If any URL does not begin with “https”, this is a finding.
Fix: F-24902r430784_fix
Configure the SharePoint server configuration to use cryptography to protect the integrity of the remote access session. Open IIS Manager. In the Connections pane, expand "Sites". Click the "Web Application" site. In the Actions pane, click "Bindings". In the Site Bindings window, click "Add". In the Add Site Binding window, change "Type" to "https", and select the site's SSL certificate. Click "OK". Remove all bindings that do not use https. Click "Close".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SP13-00-000025
- Vuln IDs
-
- V-223242
- V-59941
- Rule IDs
-
- SV-223242r612235_rule
- SV-74371
Checks: C-24915r430786_chk
Note: If no unsanctioned information is transferred, and has been documented by the Data Owner, IRM is not required. This requirement is Not Applicable. Review the SharePoint server configuration to ensure remote sessions for accessing security functions and security-relevant information are audited. Verify that SharePoint audit settings are configured at the site collection level in accordance with your system security plan. To verify audit settings at the site collection level for each site collection level subject to auditing per the SSP: Click Settings >> Site settings. If not at the root of your site collection, under Site Collection Administration, click Go to top level site settings. (Note: The Site Collection Administration section will not be available if you do not have the necessary permissions) On the Site Settings page, under Site Collection Administration, click Site collection audit settings. On the Configure Audit Settings page verify the events that are required to audit are selected, and then click OK. If nothing is selected, or the selected criteria do not match the SSP, this is a finding.
Fix: F-24903r430787_fix
Configure the SharePoint server configuration to audit remote sessions for accessing security functions and security-relevant information. In Central Administration, click on Security. On the Security page, in the Information policy list, click "Configure information rights management". Select "Use the default RMS server specified in Active Directory", or identify a specific server by selecting "Use this RMS server:" and entering the server name. Configure information management policies in accordance with the system security plan requirements.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SP13-00-000030
- Vuln IDs
-
- V-223243
- V-59943
- Rule IDs
-
- SV-223243r612235_rule
- SV-74373
Checks: C-24916r430789_chk
Review the SharePoint server configuration to ensure approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy are enforced. Inspect the logical location of the server farm web front end servers on a network diagram. Verify the Central Administration site is not installed on a server located in a DMZ or other publicly accessible segment of the network. If Central Administrator is installed on a publicly facing SharePoint server, this is a finding.
Fix: F-24904r430790_fix
Configure the SharePoint server to enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy. Remove the application server from the DMZ.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000035
- Vuln IDs
-
- V-223244
- V-59945
- Rule IDs
-
- SV-223244r612235_rule
- SV-74375
Checks: C-24917r430792_chk
Note: If no data is exchanged between different security domains, and has been documented by the Data Owner, IRM is not required. This requirement is Not Applicable. Review the SharePoint server configuration to ensure data type, specification, and usage when transferring information between different security domains are identified so policy restrictions may be applied. An IRM must be enabled in SharePoint. The Windows Rights Management Services (RMS) (or a comparable IRM product) can either be located through Active Directory or specified. In Central Administration, click Security. On the Security page, in the Information policy list, click "Configure information rights management". If "Do not use IRM on this server" is selected, or if a configuration error message is displayed (such as "... IRM will not work until the client is configured properly"), this is a finding.
Fix: F-24905r430793_fix
Configure the SharePoint server to identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied. In Central Administration, click Security. On the Security page, in the Information policy list, click "Configure information rights management". Select "Use the default RMS server specified in Active Directory" or identify a specific server by selecting "Use this RMS server:" and entering the server name. Configure information management policies in accordance with the system security plan requirements.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001374
- Version
- SP13-00-000040
- Vuln IDs
-
- V-223245
- V-59947
- Rule IDs
-
- SV-223245r612235_rule
- SV-74377
Checks: C-24918r430795_chk
Note: If no unsanctioned information is transferred, and has been documented by the Data Owner, IRM is not required. This requirement is Not Applicable. Review the SharePoint server configuration to ensure the transfer of unsanctioned information in accordance with security policy is prohibited. An IRM must be enabled in SharePoint. The Windows Rights Management Services (RMS) (or a comparable IRM product) can either be located through Active Directory or specified. In Central Administration, click Security. On the Security page, in the Information policy list, click "Configure information rights management". If "Do not use IRM on this server" is selected or if a configuration error message is displayed (such as "... IRM will not work until the client is configured properly"), this is a finding.
Fix: F-24906r430796_fix
Configure the SharePoint server to prohibit the transfer of unsanctioned information in accordance with security policy. In Central Administration, click Security. On the Security page, in the Information policy list, click "Configure information rights management". Select "Use the default RMS server specified in Active Directory", or identify a specific server by selecting "Use this RMS server:" and entering the server name. Configure information management policies in accordance with the system security plan requirements.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SP13-00-000045
- Vuln IDs
-
- V-223246
- V-59949
- Rule IDs
-
- SV-223246r612235_rule
- SV-74379
Checks: C-24919r430798_chk
Note: If no unsanctioned information is transferred, and has been documented by the Data Owner, IRM is not required. This requirement is Not Applicable. Review the SharePoint server configuration to ensure an approved system use notification message or banner is displayed before granting access to the system. Banner application occurs on a per-Web Application basis: Obtain a listing of all SharePoint Web applications. Open a Web browser and navigate to the SharePoint Web application home page. Verify the authorized DoD warning banner text is displayed on the SharePoint web application home page. If the authorized DoD warning banner text is not displayed on the first screen of the SharePoint web application, this is a finding. Note: Supplementary Information: DoD Logon Banner "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
Fix: F-24907r430799_fix
Configure the SharePoint web application's home page to display the authorized DoD warning banner text on or before the logon page.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SP13-00-000055
- Vuln IDs
-
- V-223247
- V-59953
- Rule IDs
-
- SV-223247r612235_rule
- SV-74383
Checks: C-24920r430801_chk
Review the SharePoint server configuration to ensure designated organizational personnel are allowed to select which auditable events are to be audited by specific components of the system. Navigate to Central Administration. Click "Monitoring". Click "Configure Diagnostic Logging". Validate that the selected event categories and trace levels match those defined by the organization's system security plan. Remember that a base set of events are always audited. If the selected event categories/trace levels are inconsistent with those defined in the organization's system security plan, this is a finding.
Fix: F-24908r430802_fix
Configure the SharePoint server configuration to allow designated organizational personnel to select which auditable events are to be audited by specific components of the system. Navigate to Central Administration. Click "Monitoring". Click "Configure Diagnostic Logging". Select the event categories and trace levels to match those defined by the organization's system security plan. Remember that a base set of events is always audited. Click "Ok".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000060
- Vuln IDs
-
- V-223248
- V-59955
- Rule IDs
-
- SV-223248r612235_rule
- SV-74385
Checks: C-24921r430804_chk
Review the SharePoint server configuration to ensure network traffic generated above configurable traffic volume thresholds, as defined by the organization or site SSP, is rejected or delayed. Log on to the server. Click Start. Type Internet Information Services Manager in the Search Bar, click Enter. Determine which IIS Sites are subject to user traffic. This is generally the IIS site hosting the Content Web Application. For each site IIS site subject to user traffic, select the site. Click Advanced Settings. Expand Connection Limits. Ensure the following settings possess a value: -Connection Time-Out -Maximum Bandwidth -Maximum Concurrent Connections Repeat steps for each site subject to user traffic. Otherwise, this is a finding.
Fix: F-24909r430805_fix
Configure SharePoint to reject or delay, as defined by the organization or site SSP, network traffic generated above configurable traffic volume thresholds. Log on to the server. Click Start. Type Internet Information Services Manager in the Search Bar, click Enter. Determine which IIS Sites are subject to user traffic. This is generally the IIS site hosting the Content Web Application. For each site IIS site subject to user traffic, select the site. Click Advanced Settings. Expand Connection Limits. Ensure the following settings possess a value: -Connection Time-Out -Maximum Bandwidth -Maximum Concurrent Connections Repeat steps for each site subject to user traffic.
- RMF Control
- SC-18
- Severity
- H
- CCI
- CCI-001695
- Version
- SP13-00-000065
- Vuln IDs
-
- V-223249
- V-59957
- Rule IDs
-
- SV-223249r612235_rule
- SV-74387
Checks: C-24922r430807_chk
Review the SharePoint server configuration to ensure the execution of prohibited mobile code is prevented. Navigate to Central Administration. Click Manage Web Applications. For each Web Application in the Farm: -Click on the Web Application to configure. -Click on the drop-down box below General Settings. -Click on General Settings in the drop down box. -Under Browser File Handling, verify that "Strict" is selected. If "Strict" is not selected, this is a finding.
Fix: F-24910r430808_fix
Configure SharePoint to prevent the execution of prohibited mobile code. Navigate to Central Administration. Click Manage Web Applications. For each Web Application in the Farm: -Click on the Web Application to configure. -Click on the drop-down box below General Settings. -Click on General Settings in the drop down box. -Under Browser File Handling, verify that "Strict" is selected. If "Strict" is not selected, this is a finding. Mobile code can be further restricted to meet the policy of the organization: Log on to a farm server hosting Central Administration. Click Start and type SharePoint 2013 Management Shell followed by Enter. Type $webApp = Get-SPWebApplication -Identity {URL} where {URL is the {URL} of the web application to configure. Press Enter. Type $webApp.AllowedInlineDownloadedMimeTypes. Remove ({mime type}) where {mime type} represents the mime type to remove (e.g., application\x-shockwave-flash). Press Enter.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SP13-00-000075
- Vuln IDs
-
- V-223250
- V-59961
- Rule IDs
-
- SV-223250r612235_rule
- SV-74391
Checks: C-24923r430810_chk
Review the SharePoint server configuration to ensure replay-resistant authentication mechanisms for network access to privileged accounts are used. SharePoint must be configured to use Kerberos as the primary authentication provider. Log on to the server. Click Start. Type Internet Information Services Manager in the Search Bar, click Enter. Expand the server node in the tree view and expand the "Sites" node. *For each...* Select a SharePoint Web Application site to review. In the "IIS" section, double-click Authentication and then select "Windows Authentication". Right-click "Windows Authentication" and select "Providers". Ensure "Negotiate" is listed first. If NTLM is listed first in the Enabled Providers box, this is a finding.
Fix: F-24911r430811_fix
Configure the SharePoint server to use replay-resistant authentication mechanisms for network access to privileged accounts. If the web application is using Integrated Windows Authentication as the claims provider, perform the following: Open the Central Administration site, select "Application Management". On the "Application Management" page, select "Manage Web Applications", select the web application that corresponds to the site reviewed in the "Check" section above, then click the "Authentication Providers" button in the ribbon. Select the zone corresponding to the web application being reviewed, which will open the "Edit Authentication" dialog in the "Claims Authentication Types" section, select "Negotiate (Kerberos)" in the "Integrated Windows Authentication" dropdown, then click "Save".
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SP13-00-000080
- Vuln IDs
-
- V-223251
- V-59963
- Rule IDs
-
- SV-223251r612235_rule
- SV-74393
Checks: C-24924r430813_chk
Review the SharePoint configuration to ensure non-organizational users (or processes acting on behalf of non-organizational users) are uniquely identified and authenticated. Navigate to Central Administration website. Click on "Manage web applications". Click the web application name. Click the "Authentication Providers" button in the "Web Applications" ribbon. Click each Zone, and verify that the "Enable anonymous access" check box is not selected. If it is selected and the web application zone is not defined in the system security plan as allowing anonymous access, this is a finding. Repeat steps for each web application.
Fix: F-24912r430814_fix
Configure SharePoint to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users). Navigate to Central Administration website. Click on "Manage web applications". Click the web application name. Click the "Authentication Providers" button in the "Web Applications" ribbon. Click each Zone, and clear the "Enable anonymous access" check box. Click "Save". Repeat steps for each web application.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SP13-00-000085
- Vuln IDs
-
- V-223252
- V-59965
- Rule IDs
-
- SV-223252r612235_rule
- SV-74395
Checks: C-24925r430816_chk
Review the SharePoint server configuration to ensure required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance are implemented. Open MMC. Click "File", "Add/Remove Snap-in", and "add Group Policy Object Editor". Enter a name for the Group Policy Object, or accept the default. Click "Finish". Click "OK". Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click "SSL Configuration Settings", click "SSL Cipher Suite Order", click "Edit". In the "SSL Cipher Suite Order" dialog box, if "Enabled" is not selected, this is a finding. Under Options, in the "SSL Cipher Suites" text box, a list of cipher suites will be displayed. If any DES or RC4 cipher suites exist in the list, this is a finding.
Fix: F-24913r430817_fix
Configure the SharePoint server to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Open MMC. Click “File”, “Add/Remove Snap-in”, and “add Group Policy Object Editor”. Enter a name for the Group Policy Object, or accept the default. Click “Finish”. Click “OK”. Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click “SSL Configuration Settings”, click “SSL Cipher Suite Order”, and then click “Edit”. In the “SSL Cipher Suite Order” dialog box, select "Enabled" option. Under “Options”, in the “SSL Cipher Suites” text box, enter desired cipher suites that are not DES or RC4. Click “OK”.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SP13-00-000095
- Vuln IDs
-
- V-223254
- V-59969
- Rule IDs
-
- SV-223254r612235_rule
- SV-74399
Checks: C-24927r430822_chk
Review the SharePoint server configuration to ensure NSA-approved cryptography is employed to protect classified information. Open MMC. Click "File", "Add/Remove Snap-in", and "add Group Policy Object Editor". Enter a name for the Group Policy Object, or accept the default. Click "Finish". Click "OK". Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click "SSL Configuration Settings", click "SSL Cipher Suite Order", click "Edit". In the "SSL Cipher Suite Order" dialog box, if "Enabled" is not selected, this is a finding. Under Options, in the "SSL Cipher Suites" text box, a list of cipher suites will be displayed. If any DES or RC4 cipher suites exist in the list, this is a finding.
Fix: F-24915r430823_fix
Configure SharePoint to employ NSA-approved cryptography to protect classified information. Open MMC. Click “File”, “Add/Remove Snap-in”, and “add Group Policy Object Editor”. Enter a name for the Group Policy Object, or accept the default. Click “Finish”. Click “OK”. Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click “SSL Configuration Settings”, click “SSL Cipher Suite Order”, and then click “Edit”. In the “SSL Cipher Suite Order” dialog box, select "Enabled" option. Under “Options”, in the “SSL Cipher Suites” text box, enter desired cipher suites that are not DES or RC4. Click “OK”.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SP13-00-000100
- Vuln IDs
-
- V-223255
- V-59971
- Rule IDs
-
- SV-223255r612235_rule
- SV-74401
Checks: C-24928r430825_chk
Review the SharePoint server configuration to ensure FIPS-validated cryptography is employed to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals. Open MMC. Click "File", "Add/Remove Snap-in", and "add Group Policy Object Editor". Enter a name for the Group Policy Object, or accept the default. Click "Finish". Click "OK". Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click "SSL Configuration Settings", click "SSL Cipher Suite Order", click "Edit". In the "SSL Cipher Suite Order" dialog box, if "Enabled" is not selected, this is a finding. Under Options, in the "SSL Cipher Suites" text box, a list of cipher suites will be displayed. If any DES or RC4 cipher suites exist in the list, this is a finding.
Fix: F-24916r430826_fix
Configure SharePoint to employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals. Open MMC. Click “File”, “Add/Remove Snap-in”, and “add Group Policy Object Editor”. Enter a name for the Group Policy Object, or accept the default. Click “Finish”. Click “OK”. Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click “SSL Configuration Settings”, click “SSL Cipher Suite Order”, and then click “Edit”. In the “SSL Cipher Suite Order” dialog box, select "Enabled" option. Under “Options”, in the “SSL Cipher Suites” text box, enter desired cipher suites that are not DES or RC4. Click “OK”.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- SP13-00-000110
- Vuln IDs
-
- V-223257
- V-59975
- Rule IDs
-
- SV-223257r612235_rule
- SV-74405
Checks: C-24930r430828_chk
Review the SharePoint server configuration to ensure SSL Mutual authentication of both client and server during the entire session. Navigate to Central Administration. Under “System Settings”, click “Configure Alternate Access mappings”. Review the “Public URL for zone” column values. If any URL does not begin with “https”, this is a finding.
Fix: F-24918r430829_fix
Configure the SharePoint server to ensure SSL Mutual authentication of both client and server during the entire session. Open IIS Manager. In the Connections pane, expand "Sites". Click the "Web Application" site. In the Actions pane, click "Bindings". In the Site Bindings window, click "Add". In the Add Site Binding window, change "Type" to "https", and select the site's SSL certificate. Click "OK". Remove all bindings that do not use https. Click "Close".
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001185
- Version
- SP13-00-000115
- Vuln IDs
-
- V-223258
- V-59977
- Rule IDs
-
- SV-223258r612235_rule
- SV-74407
Checks: C-24931r430831_chk
Review the SharePoint server configuration to ensure user sessions are terminated upon user logoff, and when idle time limit is exceeded. Navigate to Central Administration website. Click "Application Management". Click "Manage Web Applications". Repeat the following steps for each web application: -Select the web application. -Click "General Settings" in the "Web Application" ribbon. -In the "Web Page Security Validation" section, verify that "Security Validation is:" is set to "On" and that the "Security Validation Expires:" setting is set to 15 minutes. Otherwise, this is a finding.
Fix: F-24919r430832_fix
Configure the SharePoint server to terminate user sessions upon user logoff, and when idle time limit is exceeded. Navigate to Central Administration website. Click "Application Management". Click "Manage Web Applications". Repeat the following steps for each web application: -Select the web application. -Click "General Settings" in the "Web Application" ribbon. -In the "Web Page Security Validation" section, set "Security Validation:" to "On" and that the "Security Validation Expires:" setting is set to 15 minutes.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002420
- Version
- SP13-00-000120
- Vuln IDs
-
- V-223259
- V-59979
- Rule IDs
-
- SV-223259r612235_rule
- SV-74409
Checks: C-24932r430834_chk
Review the SharePoint server configuration to ensure the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission is maintained. In SharePoint Central Administration, click Application Management. On the Application Management page, in the Web Applications list, click Manage web applications. On the Web Applications Management page, verify that each Web Application URL begins with https. If the URL does not begin with https, this is a finding. If SharePoint communications between all components and clients are protected by alternative physical measures that have been approved by the AO, this is not a finding.
Fix: F-24920r430835_fix
Configure the SharePoint server to maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. Open IIS Manager. In the Connections pane, expand Sites. Click the Web Application site. In the Actions pane, click Bindings. In the Site Bindings window, click Add. In the Add Site Binding window, change Type to https, and select the site's SSL certificate. Click OK, and then click Close.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- SP13-00-000125
- Vuln IDs
-
- V-223260
- V-59981
- Rule IDs
-
- SV-223260r612235_rule
- SV-74411
Checks: C-24933r430837_chk
Review the SharePoint server configuration to ensure an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions are implemented. Log on to the server that hosts the farm's Central Administration website. Open IIS Manager. Expand "Sites" tree view and right-click the web application named "SharePoint Central Administration". Select "Edit Bindings ...". Confirm the site is bound to an out-of-band (OOB) IP address. If the site is bound to a production IP address or not bound to a specific IP address, this is a finding.
Fix: F-24921r430838_fix
Configure the SharePoint server to implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions. Log on to the server that hosts the farm's Central Administration website. Open IIS Manager. Expand "Sites" tree view and right-click the web application named "SharePoint Central Administration". Select "Edit Bindings ...". Select the site binding record and click "Edit". From the "IP Address" dropdown list, select an OOB IP address. Click "Ok". *NOTE: If the Central Administration site has multiple site bindings, steps will need to be repeated for each site binding.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001089
- Version
- SP13-00-000130
- Vuln IDs
-
- V-223261
- V-59983
- Rule IDs
-
- SV-223261r612235_rule
- SV-74413
Checks: C-24934r430840_chk
Review the SharePoint server configuration to ensure security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers are implemented. Check the network location of the Central Administration server. If the server resides in the DMZ, this is a finding. Attempt to access Central Administration without first connecting to a management network VPN. If Central Administration can be accessed over a production network, this is a finding. Attempt to connect directly to a SharePoint server (i.e., via remote desktop) without first connecting to a management network VPN. If a remote desktop session can be established via a production network, this is a finding.
Fix: F-24922r430841_fix
Configure the SharePoint server to implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers. Configure access to Central Administration to be allowed over a management (OOB) network. Configure Central Administration on a server that resides within the internal network (not on a server in the DMZ). Configure management access (i.e., remote desktop access and local server access) so that it occurs only via a management network (OOB) and not over a production network.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002421
- Version
- SP13-00-000135
- Vuln IDs
-
- V-223262
- V-59985
- Rule IDs
-
- SV-223262r612235_rule
- SV-74415
Checks: C-24935r430843_chk
Review the SharePoint server to ensure cryptographic mechanisms preventing the unauthorized disclosure of information during transmission are employed, unless the transmitted data is otherwise protected by alternative physical measures. In SharePoint Central Administration, click Application Management. On the Application Management page, in the Web Applications list, click Manage web applications. On the Web Applications Management page, verify that each Web Application URL begins with https. If the URL does not begin with https, this is a finding. If SharePoint communications between all components and clients are protected by alternative physical measures that have been approved by the AO, this is not a finding.
Fix: F-24923r430844_fix
Configure the SharePoint server to employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures. Open IIS Manager. In the Connections pane, expand Sites. Click the Web Application site. In the Actions pane, click Bindings. In the Site Bindings window, click Add. In the Add Site Binding window, change Type to https, and select the site's SSL certificate. Click OK, and then click Close.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- SP13-00-000140
- Vuln IDs
-
- V-223263
- V-59987
- Rule IDs
-
- SV-223263r612235_rule
- SV-74417
Checks: C-24936r430846_chk
Review the SharePoint server configuration to ensure non-privileged users are prevented from circumventing malicious code protection capabilities. Confirm that the list of blocked file types configured in Central Administration matches the "blacklist" document in the application's SSP. See TechNet for default file types that are blocked: http://technet.microsoft.com/en-us/library/cc262496.aspx Navigate to Central Administration. Click "Manage web applications". Select the web application by clicking its name. Select "Blocked File Types" from the ribbon. Compare the list of blocked file types to those listed in the SSP. If the SSP has file types that are not in the blocked file types list, this is a finding. Repeat check for each web application.
Fix: F-24924r430847_fix
Configure the SharePoint server to prevent non-privileged users from circumventing malicious code protection capabilities. Navigate to Central Administration. Click "Manage web applications". Select the web application by clicking its name. Select "Blocked File Types" from the ribbon. Add file types that are defined in the SSP but not in the list of blocked file types. Click "Ok". Repeat for each web application that has findings.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SP13-00-000145
- Vuln IDs
-
- V-223264
- V-59989
- Rule IDs
-
- SV-223264r612235_rule
- SV-74419
Checks: C-24937r430849_chk
Review the SharePoint server configuration to ensure mechanisms are used for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. Open MMC. Click "File", "Add/Remove Snap-in", and "add Group Policy Object Editor". Enter a name for the Group Policy Object, or accept the default. Click "Finish". Click "OK". Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click "SSL Configuration Settings", click "SSL Cipher Suite Orde"r, click "Edit". In the "SSL Cipher Suite Order" dialog box, if "Enabled" is not selected, this is a finding. Under Options, in the "SSL Cipher Suites" text box, a list of cipher suites will be displayed. If any DES or RC4 cipher suites exist in the list, this is a finding.
Fix: F-24925r430850_fix
Configure the SharePoint server to use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. Open MMC. Click “File”, “Add/Remove Snap-in”, and “add Group Policy Object Editor”. Enter a name for the Group Policy Object, or accept the default. Click “Finish”. Click “OK”. Navigate to Computer Policy >> Computer Configuration >> Administrative Templates >> Network >> SSL Configuration settings. Right-click “SSL Configuration Settings”, click “SSL Cipher Suite Order”, and then click “Edit”. In the “SSL Cipher Suite Order” dialog box, select "Enabled" option. Under “Options”, in the “SSL Cipher Suites” text box, enter desired cipher suites that are not DES or RC4. Click “OK”.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001083
- Version
- SP13-00-000150
- Vuln IDs
-
- V-223265
- V-59993
- Rule IDs
-
- SV-223265r612235_rule
- SV-74423
Checks: C-24938r430852_chk
Review the SharePoint server configuration to ensure Central Administration site is not accessible from Extranet or Internet connections. Check outside access to Central Administration. On an administrative work station, open Central Administration and make note of the URL (i.e., http://sharepointserver:7040). Try to open the Central Administration application on a regular user's workstation. Open a Web browser and type in the URL to Central Administration. If the Central Administration can be opened, this is a finding.
Fix: F-24926r430853_fix
Configure the SharePoint Central Administration site to not be accessible from Extranet or Internet connections. Block outside Central Administrator access. Use an IIS IP address restrictions, firewall, or other filtering solutions to limit access to Central Administration site.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SP13-00-000155
- Vuln IDs
-
- V-223266
- V-59995
- Rule IDs
-
- SV-223266r612235_rule
- SV-74425
Checks: C-24939r430855_chk
For environments requiring an Internet-facing capability, ensure the SharePoint Central Administration application server is not in the DMZ. Inspect the logical location of the server farm web front end servers. Verify the Central Administration site is not installed on a server located in a DMZ or other publicly accessible segment of the network. If Central Administrator is installed on a publicly facing SharePoint server, this is a finding.
Fix: F-24927r430856_fix
For environments requiring an Internet-facing capability, remove the SharePoint Central Administration application server upon which Central Administration is installed from the DMZ.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000160
- Vuln IDs
-
- V-223267
- V-59997
- Rule IDs
-
- SV-223267r612235_rule
- SV-74427
Checks: C-24940r430858_chk
Review the SharePoint server configuration to ensure the farm service account (database access account) is configured with minimum privileges in Active Directory (AD). - Verify the account has least privilege in Active Directory. - Navigate to “Active Directory Users and Computers” >> Users. - Double click on the account to view the account properties. - Select the “Members of” tab and verify this account is a member of the Domain Users group only. - Select the other tabs in this area to verify no other services or permissions are configured for this account. If the farm service account is a member of other groups other than Domain Users, this is a finding. If the Setup User account has unneeded permissions or services assigned, this is a finding.
Fix: F-24928r430859_fix
Configure the SharePoint farm service account (database access account) with minimum privileges in Active Directory (AD). Ensure the Setup User domain user has minimum permissions in Active Directory. - Using the AD DS console, navigate to “Active Directory Users and Computers” >> Users. - Double click on the account to view the account properties. - Select the “Members of” tab and configure the farm service account is a member of the Domain Users group. Remove any other group membership from the account. - Select the other tabs in this area and remove any services or permissions configured for this account.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000165
- Vuln IDs
-
- V-223268
- V-59999
- Rule IDs
-
- SV-223268r612235_rule
- SV-74429
Checks: C-24941r430861_chk
Review the SharePoint server configuration to ensure the farm service account (database access account) is configured with minimum privileges on the SQL server. - Launch the SQL Server Management Console and navigate to Security >> Logins. - Select the SharePoint farm service account. - Click on "Server Roles" and verify only public, dbcreator, and securityadmin are checked. - Click on "User Mapping" and verify that the farm account is a member of the public and db_owner role on each SharePoint database. Otherwise, this is a finding.
Fix: F-24929r430862_fix
Configure the SharePoint farm service account (database access account) with minimum privileges on the SQL server. Configure the account on each SQL server in the farm. - Launch the SQL Server Management Console and navigate to Security >> Logins. - Select the SharePoint farm service account. - Click on Server Roles. - Ensure only public, dbcreator, and securityadmin roles are checked. - Remove checks from all other roles.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000170
- Vuln IDs
-
- V-223269
- V-60001
- Rule IDs
-
- SV-223269r612235_rule
- SV-74431
Checks: C-24942r430864_chk
Review the SharePoint server configuration to ensure the setup account is configured with the minimum privileges in Active Directory. Verify the account has least privilege in Active Directory. - Navigate to “Active Directory Users and Computers” >> Users. - Double click on the account to view the account properties. - Select the “Members of” tab and verify this account is a member of the Domain Users group only. - Select the other tabs in this area to verify no other services or permissions are configured for this account. If the Setup User account is a member of other groups other than Domain Users, this is a finding. If the Setup User account has unneeded permissions or services assigned, this is a finding.
Fix: F-24930r430865_fix
Configure the SharePoint setup account to be configured with the minimum privileges in Active Directory. Ensure the Setup User domain user has minimum permissions in Active Directory. - Using the AD DS console, navigate to “Active Directory Users and Computers” >> Users. - Double click on the account to view the account properties. - Select the “Members of” tab and configure the Setup user account is a member of the Domain Users group. Remove any other group membership from the account. - Select the other tabs in this area and remove any services or permissions configured for this account.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000175
- Vuln IDs
-
- V-223270
- V-60003
- Rule IDs
-
- SV-223270r612235_rule
- SV-74433
Checks: C-24943r430867_chk
The SharePoint setup account must be configured with the minimum privileges on the SQL server. - Launch the SQL Server Management Console and navigate to Security >> Logins. - Select the SharePoint Setup User account. - Click on "Server Roles" and verify only public, dbcreator, and securityadmin are checked. - Click on "User Mapping" and verify that the setup account is a member of the public and db_owner role on each SharePoint database. Otherwise, this is a finding.
Fix: F-24931r430868_fix
Configure the SharePoint setup account with minimum privileges on the SQL server. Configure the account on the SQL server. - Launch the SQL Server Management Console and navigate to Security >> Logins. - Select the SharePoint Setup User account. - Click on "Server Roles". - Ensure only public, dbcreator, and securityadmin roles are checked. - Remove checks from all other roles.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000180
- Vuln IDs
-
- V-223271
- V-60005
- Rule IDs
-
- SV-223271r612235_rule
- SV-74435
Checks: C-24944r430870_chk
Review the SharePoint server configuration to ensure the setup account is configured with the minimum privileges for the local server. - On the server(s) where the SharePoint software is installed, navigate to Server Manager >> Local Users and Groups. - Select the “Member of” tab and verify this account is only a member of the Administrators, WSS_ADMIN_WPG, and IIS_IUSRS groups. - Select the other tabs in this area to verify no other services or permissions are configured for this account. If the Setup User account is a member of any other groups than Administrators, WSS_ADMIN_WPG, and IIS_IUSRS on the local server where SharePoint is installed, this is a finding.
Fix: F-24932r430871_fix
Configure the SharePoint setup account with the minimum privileges for the local server. - On the server(s) where the SharePoint software is installed, navigate to Server Manager -> Local Users and Groups. - Select the “Member of” tab. - Configure the SharePoint Setup User as a member of Administrators, WSS_ADMIN_WPG, and IIS_IUSRS groups. - Remove all other group memberships from this account. - Select the other tabs in this area and remove other services or permissions configured for this account.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SP13-00-000185
- Vuln IDs
-
- V-223272
- V-60007
- Rule IDs
-
- SV-223272r612235_rule
- SV-74437
Checks: C-24945r430873_chk
Review the SharePoint server to ensure a secondary site collection administrator is defined when creating a new site collection. Log on to SharePoint Central Administration as a member of the Farm Administration Group. Click on "Application Management". Select "Site Collections" >> Change Site Collections Administrator. For each Site Collections, review Secondary Site Collection Administrator. If Secondary Site Collection Administrator is not defined, this is a finding.
Fix: F-24933r430874_fix
Configure a secondary SharePoint site collection administrator when creating a new site collection. Log on to SharePoint Central Administration as a member of the Farm Administration Group. Click on "Application Management". Select "Site Collections" >> Change Site Collections Administrator. For each site, define a Secondary Site Collection Administrator. Select "OK".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SP13-00-000190
- Vuln IDs
-
- V-223273
- V-60009
- Rule IDs
-
- SV-223273r612235_rule
- SV-74439
Checks: C-24946r430876_chk
Review the SharePoint server Central Administration configuration to ensure the port number selected complies with DoD Ports and Protocol Management (PPSM) program requirements. Open the SharePoint Management Shell (Start >> All Programs >> Microsoft SharePoint Products >> SharePoint Management Shell). Type the following command at the PowerShell prompt: Get-SPWebApplication -IncludeCentralAdministration Find the entry for the Central Administration web application and verify the port listed in the URL column is allowed by the DoD PPSM policy. If the port number is not allowed in accordance with DoD PPSM policy, this is a finding.
Fix: F-24934r430877_fix
Configure the SharePoint Central Administration port number selected to comply with DoD Ports and Protocol Management (PPSM) program requirements. Open the SharePoint Management Shell (Start >> All Programs >> Microsoft SharePoint Products >> SharePoint Management Shell). Change the port number to a PPS-approved port that does not conflict with existing port usage using the following command: Set -SPCentralAdministration -Port <PortNumber> Press "Enter" to save.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000195
- Vuln IDs
-
- V-223274
- V-60011
- Rule IDs
-
- SV-223274r612235_rule
- SV-74441
Checks: C-24947r430879_chk
Review the SharePoint server configuration to ensure SharePoint-specific malware (i.e. anti-virus) protection software is integrated and configured. Log on to Central Administrator. Navigate to Operations >> Security Configuration. Select Anti-virus. If any of the following boxes are unselected, this is a finding: - Scan documents on upload. - Scan documents on download. - Attempt to clean infected documents.
Fix: F-24935r430880_fix
Configure and integrate SharePoint-specific malware (i.e. anti-virus) protection software on the SharePoint server. Install and configure anti-virus package. Install a SharePoint Server 2010-specific antivirus package. Log in to Central Administration. Navigate to Operations >> Security Configuration. Select Anti-virus. Check the following boxes: - Scan documents on upload. - Scan documents on download. - Attempt to clean infected documents. Select "OK".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001167
- Version
- SP13-00-000205
- Vuln IDs
-
- V-223275
- V-59991
- Rule IDs
-
- SV-223275r612235_rule
- SV-74421
Checks: C-24948r430882_chk
Review the SharePoint server configuration to ensure access to the online web part gallery is configured for limited access. Log on to Central Administration. Navigate to the Security page. Click on "Manage web part security". For each web application in the web application section, perform the following: -Select the correct web application in the web application section. -Verify "Prevents users from accessing the Online Web Part Gallery, and helps to improve security and performance" option in the Online Web Part Gallery section is selected. If the "Prevents users from accessing the Online Web Part Gallery, and helps to improve security and performance" option in the Online Web Part Gallery section is not checked, this is a finding.
Fix: F-24936r430883_fix
Configure the SharePoint server for limited access to the Online Web Part Gallery. Enable the "Prevents users from accessing the Online Web Part Gallery, and helps to improve security and performance" option for each web application. Log on to Central Administration. Navigate to the Security page. Click on "Manage web part security". For each web application in the web application section, perform the following: -Select the correct web application in the web application section. -Select the "Prevents users from accessing the Online Web Part Gallery, and helps to improve security and performance" option in the Online Web Part Gallery section. Select "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SP13-00-000210
- Vuln IDs
-
- V-223276
- V-60391
- Rule IDs
-
- SV-223276r612235_rule
- SV-74821
Checks: C-24949r612196_chk
Review the SharePoint server configuration to ensure the farm service account (database access account) is configured with the minimum privileges for the local server. - On the server(s) where the SharePoint software is installed, navigate to Server Manager >> Local Users and Groups. - Select the “Member of” tab and verify this account is only a member of the WSS_RESTRICTED_WPG, WSS_ADMIN_WPG, WSS_WPG, IIS_IUSRS, Performance Monitor User, and WSS groups. - Select the other tabs in this area to verify no other services or permissions are configured for this account. If the farm service account is a member of any other groups than WSS_RESTRICTED_WPG, WSS_ADMIN_WPG, WSS_WPG, IIS_IUSRS, Performance Monitor User, and WSS groups on the local server where SharePoint is installed, this is a finding.
Fix: F-24937r612197_fix
Configure the SharePoint farm service account (database access account) with the minimum privileges for the local server. - On the server(s) where the SharePoint software is installed, navigate to Server Manager >> Local Users and Groups. - Select the “Member of” tab. Configure the farm service account as a member of WSS_RESTRICTED_WPG, WSS_ADMIN_WPG, WSS_WPG, IIS_IUSRS, Performance Monitor User, and WSS groups. Remove all other group memberships from this account. - Select the other tabs in this area and remove other services or permissions configured for this account.
- RMF Control
- SC-16
- Severity
- M
- CCI
- CCI-001158
- Version
- SP13-00-000105
- Vuln IDs
-
- V-223277
- V-59973
- Rule IDs
-
- SV-223277r612235_rule
- SV-74403
Checks: C-24950r430888_chk
Note: If no data is exchanged between systems, and has been documented by the Data Owner, IRM is not required. This requirement is Not Applicable. Review the SharePoint server configuration to ensure the integrity of security attributes exchanged between systems is validated. An IRM must be enabled in SharePoint. The Windows Rights Management Services (RMS) (or a comparable IRM product) can either be located through Active Directory or specified. In Central Administration, click Security. On the Security page, in the Information policy list, click "Configure information rights management". If "Do not use IRM on this server" is selected, or if a configuration error message is displayed (such as "... IRM will not work until the client is configured properly"), this is a finding.
Fix: F-24938r430889_fix
Configure the SharePoint server to validate the integrity of security attributes exchanged between systems. In Central Administration, click Security. On the Security page, in the Information policy list, click "Configure information rights management". Select "Use the default RMS server specified in Active Directory", or identify a specific server by selecting "Use this RMS server:" and entering the server name. Configure information management policies in accordance with the system security plan requirements.